SlideShare a Scribd company logo
Ankit Singh Masters Student (second Semester) in  High Integrity System Fachhochschule Frankfurt am Main University of Applied Sciences
Working on Analyzer Scanner Module and  developing remote control for various scans
Development using following softwares: * Linux Ubuntu 9.10 * Java development Kit: Sun Java 6 * Eclipse for RCP/Plug-in Developers * Nmap 5.21 * JAXB 2.1.10 (Java Architecture for XML    Binding)
Stages/Flow of the Scanner module: Scanner (Nmap scripts) -> XML Doc -> JAXB -> Database
Using  Nmap Scripting Engine (nse)  for extracting information of the systems in the network. Targeting  Server Message Block  ( SMB , also known as Common Internet File System, CIFS) traffic, which is a Windows protocol.
SMB traffic is normally sent to/from ports 139 or 445 of Windows systems.
Various given SMB scripts given by Nmap to be used for Scanning the network: smb-brute.nse,  smb-enum-sessions.nse  smb-security-mode.nse,  smb-check-vulns.nse ,   smb-enum-shares.nse,  smb-server-stats.nse, smb-enum-domains.nse,  smb-enum-users.nse,  smb-system-info.nse,  smb-enum-groups.nse,  smb-os-discovery.nse,  smbv2-enabled.nse,  smb-enum-processes.nse,  smb-psexec.nse
smb-brute.nse:  This script is specifically targeted towards security auditors or penetration testers. Attempts to guess username/password combinations over SMB, storing discovered combinations for use in other scripts.
Usage :
sudo nmap -sU -sS --script smb-brute.nse -p U:137,T:139 <host> -oX <filename.xml>
smb-check-vulns.nse: Check for vulnerabilities in the system
This is one of the dangerous Script to Run and more likely it will bring down the server.
Not recommended to use in Production environment.
smb-os-discovery.nse: Attempts to determine the  operating system,  computer name, domain, and current time  over the  SMB protocol

More Related Content

DOCX
Different type of shells In Netapp Cluster mode 8.X and how to access them t...
PDF
An Express Guide ~ SNMP for Secure Rremote Resource Monitoring
DOCX
Volume migration from one aggregate to other without impacting the applicatio...
DOCX
Comparison of scheduling algorithms
PPTX
Windows xp compromise and remedies
PPTX
Daemons in PHP
PDF
Monit - Introduction, Configuration & Usage
DOCX
Different type of shells In Netapp Cluster mode 8.X and how to access them t...
An Express Guide ~ SNMP for Secure Rremote Resource Monitoring
Volume migration from one aggregate to other without impacting the applicatio...
Comparison of scheduling algorithms
Windows xp compromise and remedies
Daemons in PHP
Monit - Introduction, Configuration & Usage

What's hot (20)

PDF
Hacktivity 2016: Stealthy, hypervisor based malware analysis
ODP
Linux monitoring
PDF
Linux System Monitoring basic commands
PPTX
Presentiaon task sheduling first come first serve FCFS
PDF
BSides Denver: Stealthy, hypervisor-based malware analysis
PPT
9 cm402.18
PPTX
PowerShell 2.0 remoting
PDF
Cheatsheet: Metasploit
PPT
first come first serve scheduling in os
PPTX
Windows Crash Dump Analysis
PDF
Linux talk | scheduled tasks
PDF
Comparision of scheduling algorithms
PPT
QEMU-SystemC (FDL)
PDF
Gabriele Santomaggio - Inside Elixir/Erlang - Codemotion Milan 2018
PPTX
Smarter Scheduling (Priorities, Preemptive Priority Scheduling, Lottery and S...
PDF
Let’s Fix Logging Once and for All
DOC
Cisco be6000 solution
PDF
NSClient++ Workshop: 01 Introduction
PDF
Nested Locks in the Lock Implementation: The Real-Time Read-Write Semaphores ...
PDF
Virtual Machine Introspection with Xen
Hacktivity 2016: Stealthy, hypervisor based malware analysis
Linux monitoring
Linux System Monitoring basic commands
Presentiaon task sheduling first come first serve FCFS
BSides Denver: Stealthy, hypervisor-based malware analysis
9 cm402.18
PowerShell 2.0 remoting
Cheatsheet: Metasploit
first come first serve scheduling in os
Windows Crash Dump Analysis
Linux talk | scheduled tasks
Comparision of scheduling algorithms
QEMU-SystemC (FDL)
Gabriele Santomaggio - Inside Elixir/Erlang - Codemotion Milan 2018
Smarter Scheduling (Priorities, Preemptive Priority Scheduling, Lottery and S...
Let’s Fix Logging Once and for All
Cisco be6000 solution
NSClient++ Workshop: 01 Introduction
Nested Locks in the Lock Implementation: The Real-Time Read-Write Semaphores ...
Virtual Machine Introspection with Xen
Ad

Viewers also liked (20)

PPT
TINYOS Oscilloscope Application
PPT
Design Alternative for Parallel Systems
PPT
Simple Railroad Command Protocol
PPS
Mote Mote Radio Communication
PDF
Restricted Usage of Anonymous Credentials in VANET for Misbehaviour Detection
PDF
MicazXpl Intelligent Sensors Network Project Presentation
KEY
DO-178B/ED-12B Presentation
PPTX
Security Vision for Software on Wheels (Autonomous Vehicles)
PPT
Software Fault Tolerance
PDF
The Security and Privacy Requirements in VANET
PPT
Anti Collision Railways System
PDF
The Security and Privacy Threats to Cloud Computing
DOCX
Indian German Unity
PDF
Micazxpl - Intelligent Sensors Network project report
ZIP
Eurowerks 2009 Slideshow
PPT
Monaco 020909
PPT
LiveOffice Email Archiving & Compliance 201
PPT
Eprotect Complan Ver 4
PDF
200905 - Sociable machines
PPT
Mobile Social Media, Sept. 2010, Do You Want To Be Visible?, Marketing Club K...
TINYOS Oscilloscope Application
Design Alternative for Parallel Systems
Simple Railroad Command Protocol
Mote Mote Radio Communication
Restricted Usage of Anonymous Credentials in VANET for Misbehaviour Detection
MicazXpl Intelligent Sensors Network Project Presentation
DO-178B/ED-12B Presentation
Security Vision for Software on Wheels (Autonomous Vehicles)
Software Fault Tolerance
The Security and Privacy Requirements in VANET
Anti Collision Railways System
The Security and Privacy Threats to Cloud Computing
Indian German Unity
Micazxpl - Intelligent Sensors Network project report
Eurowerks 2009 Slideshow
Monaco 020909
LiveOffice Email Archiving & Compliance 201
Eprotect Complan Ver 4
200905 - Sociable machines
Mobile Social Media, Sept. 2010, Do You Want To Be Visible?, Marketing Club K...
Ad

Similar to Dane presentation (20)

PPT
Module 4 Enumeration
PPT
Samba
PDF
Demystifying MS17-010: Reverse Engineering the ETERNAL Exploits
PDF
Hack The Box Nest 10.10.10.178
PPTX
Samba power point presentation
PDF
Ethical hacking mind map
PDF
2600 v04 n11 (november 1987)
PPT
Vmware Command Line
PPT
Samba server
PPTX
samba server setup Pts ppt (rohit malav)
PDF
Nmap tutorial
PPTX
Week 8 IT infrastructure Scanning and Enumeration Part 2.pptx
PPTX
Presentation1
PPTX
Nmap and metasploitable
PPT
Intro To Hacking
PPTX
Network scanning
PDF
Ssh monitoring
PPTX
Samba server linux (SMB) BY ROHIT MALAV
PPT
Samba server configuration
PDF
Samba
Module 4 Enumeration
Samba
Demystifying MS17-010: Reverse Engineering the ETERNAL Exploits
Hack The Box Nest 10.10.10.178
Samba power point presentation
Ethical hacking mind map
2600 v04 n11 (november 1987)
Vmware Command Line
Samba server
samba server setup Pts ppt (rohit malav)
Nmap tutorial
Week 8 IT infrastructure Scanning and Enumeration Part 2.pptx
Presentation1
Nmap and metasploitable
Intro To Hacking
Network scanning
Ssh monitoring
Samba server linux (SMB) BY ROHIT MALAV
Samba server configuration
Samba

More from Ankit Singh (6)

PPTX
IoT in Mining for Sensing, Monitoring and Prediction of Underground Mines Roo...
PDF
Parallex - The Supercomputer
PDF
Cooperative Linux
PDF
Master Teset Specification SRCP
DOCX
Toilet etiquettes
PDF
TinyOS installation Guide And Manual
IoT in Mining for Sensing, Monitoring and Prediction of Underground Mines Roo...
Parallex - The Supercomputer
Cooperative Linux
Master Teset Specification SRCP
Toilet etiquettes
TinyOS installation Guide And Manual

Recently uploaded (20)

PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
A Presentation on Artificial Intelligence
PPTX
Spectroscopy.pptx food analysis technology
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
Electronic commerce courselecture one. Pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
Big Data Technologies - Introduction.pptx
PDF
A comparative analysis of optical character recognition models for extracting...
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Machine learning based COVID-19 study performance prediction
PDF
NewMind AI Weekly Chronicles - August'25-Week II
Network Security Unit 5.pdf for BCA BBA.
Diabetes mellitus diagnosis method based random forest with bat algorithm
Unlocking AI with Model Context Protocol (MCP)
A Presentation on Artificial Intelligence
Spectroscopy.pptx food analysis technology
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Mobile App Security Testing_ A Comprehensive Guide.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
The Rise and Fall of 3GPP – Time for a Sabbatical?
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Encapsulation_ Review paper, used for researhc scholars
Group 1 Presentation -Planning and Decision Making .pptx
Electronic commerce courselecture one. Pdf
Spectral efficient network and resource selection model in 5G networks
Reach Out and Touch Someone: Haptics and Empathic Computing
Big Data Technologies - Introduction.pptx
A comparative analysis of optical character recognition models for extracting...
20250228 LYD VKU AI Blended-Learning.pptx
Machine learning based COVID-19 study performance prediction
NewMind AI Weekly Chronicles - August'25-Week II

Dane presentation

  • 1. Ankit Singh Masters Student (second Semester) in High Integrity System Fachhochschule Frankfurt am Main University of Applied Sciences
  • 2. Working on Analyzer Scanner Module and developing remote control for various scans
  • 3. Development using following softwares: * Linux Ubuntu 9.10 * Java development Kit: Sun Java 6 * Eclipse for RCP/Plug-in Developers * Nmap 5.21 * JAXB 2.1.10 (Java Architecture for XML Binding)
  • 4. Stages/Flow of the Scanner module: Scanner (Nmap scripts) -> XML Doc -> JAXB -> Database
  • 5. Using Nmap Scripting Engine (nse) for extracting information of the systems in the network. Targeting Server Message Block ( SMB , also known as Common Internet File System, CIFS) traffic, which is a Windows protocol.
  • 6. SMB traffic is normally sent to/from ports 139 or 445 of Windows systems.
  • 7. Various given SMB scripts given by Nmap to be used for Scanning the network: smb-brute.nse, smb-enum-sessions.nse smb-security-mode.nse, smb-check-vulns.nse , smb-enum-shares.nse, smb-server-stats.nse, smb-enum-domains.nse, smb-enum-users.nse, smb-system-info.nse, smb-enum-groups.nse, smb-os-discovery.nse, smbv2-enabled.nse, smb-enum-processes.nse, smb-psexec.nse
  • 8. smb-brute.nse: This script is specifically targeted towards security auditors or penetration testers. Attempts to guess username/password combinations over SMB, storing discovered combinations for use in other scripts.
  • 10. sudo nmap -sU -sS --script smb-brute.nse -p U:137,T:139 <host> -oX <filename.xml>
  • 11. smb-check-vulns.nse: Check for vulnerabilities in the system
  • 12. This is one of the dangerous Script to Run and more likely it will bring down the server.
  • 13. Not recommended to use in Production environment.
  • 14. smb-os-discovery.nse: Attempts to determine the operating system, computer name, domain, and current time over the SMB protocol
  • 15. This is done by starting a session with the anonymous
  • 16. account (or with a proper user account, if one is given -- likely doesn't make a difference); in response to a session starting, the server will send back all this information.
  • 17. Enumeration SMB scripts : smb-enum-sessions.nse , smb-enum-shares.nse, smb-enum-domains.nse, smb-enum-users.nse, smb-enum-groups.nse, smb-enum-processes.nse These scripts responsible for: Pulling a list of processes from the remote server over SMB.
  • 18. Enumerates the users logged into a system either locally or through an SMB share.
  • 19. Attempts to enumerate domains on a system, along with their policies.
  • 20. Pulls a list of processes from the remote server over SMB.
  • 21. Attempts to enumerate the users on a remote Windows system, with as much information as possible
  • 22. DaNe Plugin CAS Server Side Remote Control
  • 24.  
  • 25.  
  • 26.